Dotclear 2.25.3 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension through the blog post creation interface. Attackers can upload files containing PHP system commands that execute when the uploaded file is accessed, enabling arbitrary code execution on the server.
References
| Link | Resource |
|---|---|
| https://dotclear.org/ | Product |
| https://www.exploit-db.com/exploits/51353 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/dotclear-authenticated-remote-code-execution-via-file-upload | Third Party Advisory Exploit |
Configurations
History
No history.
Information
Published : 2025-12-19 21:15
Updated : 2025-12-24 16:57
NVD link : CVE-2023-53952
Mitre link : CVE-2023-53952
CVE.ORG link : CVE-2023-53952
JSON object : View
Products Affected
dotclear
- dotclear
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
